/external/dropbear/ |
H A D | keyimport.c | 355 int encrypted; member in struct:openssh_key 373 ret->encrypted = 0; 423 ret->encrypted = 1; 467 if (ret->encrypted && ret->keyblob_len % 8 != 0) { 501 ret = key->encrypted; 529 if (key->encrypted) { 530 errmsg = "encrypted keys not supported currently"; 987 * - string cipher-type (tells you if key is encrypted) 988 * - string encrypted-blob 995 * The encrypted blo [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | isakmp_inf.c | 139 int encrypted; 143 encrypted = ISSET(((struct isakmp *)msg0->v)->flags, ISAKMP_FLAG_E); 147 if (encrypted) { 180 if (encrypted) { 262 /* make sure the packet was encrypted after the beginning of phase 1. */ 274 "%s message must be encrypted\n", 295 msgid, encrypted); 300 msgid, encrypted); 331 isakmp_info_recv_n(iph1, notify, msgid, encrypted) 335 int encrypted; 138 int encrypted; local [all...] |
/external/qemu/ |
H A D | block_int.h | 120 int encrypted; /* if true, the media is encrypted */ member in struct:BlockDriverState
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 272 wpa_printf(MSG_INFO, "IKEV2: Invalid encrypted " 389 payloads->encrypted = pdata; 498 const u8 *encrypted, size_t encrypted_len, 510 if (encrypted == NULL) { 534 iv = encrypted; 536 end = encrypted + encrypted_len; 574 wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted " 495 ikev2_decrypt_payload(int encr_id, int integ_id, struct ikev2_keys *keys, int initiator, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, size_t *res_len) argument
|
H A D | ikev2_common.h | 320 const u8 *encrypted; member in struct:ikev2_payloads 332 const u8 *encrypted, size_t encrypted_len,
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_server/ |
H A D | ikev2.c | 453 const u8 *encrypted, 463 hdr, encrypted, encrypted_len, 500 if (pl->encrypted) { 503 if (ikev2_process_sa_init_encr(data, hdr, pl->encrypted, 507 "encrypted payload"); 727 &data->keys, 0, hdr, pl->encrypted, 451 ikev2_process_sa_init_encr(struct ikev2_initiator_data *data, const struct ikev2_hdr *hdr, const u8 *encrypted, size_t encrypted_len, u8 next_payload) argument
|
/external/wpa_supplicant/ |
H A D | eap.c | 934 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 942 int encrypted) 961 } else if (!encrypted && config->anonymous_identity) { 941 eap_sm_buildIdentity(struct eap_sm *sm, int id, size_t *len, int encrypted) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 954 * @encrypted: Whether the packet is for encrypted tunnel (EAP phase 2) 961 struct wpabuf * eap_sm_buildIdentity(struct eap_sm *sm, int id, int encrypted) argument 979 } else if (!encrypted && config->anonymous_identity) {
|
/external/zlib/contrib/minizip/ |
H A D | unzip.c | 147 int encrypted; member in struct:__anon6240 490 us.encrypted = 0; 1184 s->encrypted=1; 1287 if(s->encrypted)
|
/external/openssl/crypto/pkcs7/ |
H A D | pkcs7.h | 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon3164
|
/external/openssl/include/openssl/ |
H A D | pkcs7.h | 212 PKCS7_ENCRYPT *encrypted; member in union:pkcs7_st::__anon3208
|